CN110992047A - Full-touch-screen POS terminal PIN safe input method - Google Patents

Full-touch-screen POS terminal PIN safe input method Download PDF

Info

Publication number
CN110992047A
CN110992047A CN201911202525.2A CN201911202525A CN110992047A CN 110992047 A CN110992047 A CN 110992047A CN 201911202525 A CN201911202525 A CN 201911202525A CN 110992047 A CN110992047 A CN 110992047A
Authority
CN
China
Prior art keywords
cpu
pin
input
key
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911202525.2A
Other languages
Chinese (zh)
Inventor
黄水香
林国兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Newland Payment Technology Co ltd
Original Assignee
Fujian Newland Payment Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Newland Payment Technology Co ltd filed Critical Fujian Newland Payment Technology Co ltd
Priority to CN201911202525.2A priority Critical patent/CN110992047A/en
Publication of CN110992047A publication Critical patent/CN110992047A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0018Constructional details, e.g. of drawer, printing means, input means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention belongs to the technical field of POS terminal safety, and particularly relates to a full-touch POS terminal PIN safety input method which specifically comprises the following steps: step S1: after the terminal is started, the touch screen is controlled by an application CPU in a default mode, when an application program requires to execute PIN input, the application CPU informs a safety CPU, and parameters related to the PIN input are sent to the safety CPU; step S2: the safety CPU receives a PIN input request sent by the application CPU, and immediately switches the control signal of the touch screen from the application CPU to the safety CPU; step S3: the safety CPU circularly detects and processes PIN input on the touch screen, when the PIN input is finished, the PIN is encrypted by using a PIN secret key preinstalled by the safety CPU, then the ciphertext PIN is returned to the application CPU, and a control signal of the touch screen is switched to the application CPU; step S4: and the application CPU packs the cipher text PIN acquired from the safety CPU into transaction data and then sends the transaction data to a transaction background, so that one financial transaction is completed.

Description

Full-touch-screen POS terminal PIN safe input method
Technical Field
The invention belongs to the technical field of POS terminal safety, and particularly relates to a full-touch-screen POS terminal PIN safety input method.
Background
With the wide application of the intelligent operating system and the full-touch-screen input mode, the design of the intelligent operating system and the full-touch-screen input mode is gradually adopted in the existing financial POS terminal, and the POS terminal in the form is generally called a full-touch-screen POS terminal. The main function of the full-touch screen POS terminal is still financial transaction, but the abundant application of the full-touch screen POS terminal can provide more value-added services for customers, so that the full-touch screen POS terminal is gradually favored by the market. The mainstream intelligent operating system of the full-touch POS terminal is an Android system, the PIN input mode of a cardholder adopts full-touch input, a virtual keyboard is displayed on a display screen of the full-touch POS terminal, and the cardholder inputs the PIN in a touch mode.
Because the openness of the intelligent operating system and the vulnerability of the operating system are discovered continuously, if a cardholder inputs PIN on a touch screen controlled by the intelligent operating system, the intelligent operating system can directly acquire PIN plaintext, once the operating system is utilized by the vulnerability, the PIN of the cardholder risks being stolen, and the fund security of the cardholder is threatened, so that a method for safely inputting the PIN on a full-touch POS terminal must be designed.
Disclosure of Invention
Aiming at the problems, the invention provides a full-touch POS terminal PIN safe input method.
In order to achieve the purpose, the invention is realized by the following technical scheme:
a full-touch POS terminal PIN safe input method specifically comprises the following steps:
step S1: after the terminal is started, the touch screen is controlled by an application CPU in a default mode, when an application program requires to execute PIN input, the application CPU informs a safety CPU, and parameters related to the PIN input are sent to the safety CPU;
step S2: the safety CPU receives a PIN input request sent by the application CPU, and immediately switches the control signal of the touch screen from the application CPU to the safety CPU;
step S3: the safety CPU circularly detects and processes PIN input on the touch screen, when the PIN input is finished, the PIN is encrypted by using a PIN secret key preinstalled by the safety CPU, then the ciphertext PIN is returned to the application CPU, and a control signal of the touch screen is switched to the application CPU;
step S4: and the application CPU packs the cipher text PIN acquired from the safety CPU into transaction data and then sends the transaction data to a transaction background, so that one financial transaction is completed.
Further, the specific implementation process of step S1 is as follows:
step S11: the method comprises the steps that an application program designs the layout of a virtual keyboard on a touch screen, and coordinate information of each key for PIN input is determined;
step S12: and the application CPU sends a PIN input request, and transmits the coordinate information of each key on the virtual keyboard and the related parameters of the encrypted PIN to the security CPU.
Specifically, the keys of the virtual keyboard in step S11 at least include the numeric keys "0" to "9", and the function keys "confirm", "cancel", and "backspace".
Further, the specific implementation process of step S2 is as follows:
step S21: the safety CPU receives the PIN input request, judges the validity of all parameters, refuses to execute PIN input if the parameters are invalid, and saves the parameters if the parameters are valid;
step S22: the safety CPU obtains a physical control signal of the touch screen by switching the hardware switch, and the application CPU is ensured not to obtain any touch screen input;
step S23: the safe CPU randomly sorts the number keys from '0' to '9', then corresponds to the coordinate information of the number keys issued by the application program one by one, and simultaneously returns the random number sequence to the application CPU, and the application CPU displays the random number keys on the virtual keyboard.
Further, the specific implementation process of step S3 is as follows:
step S31: the safe CPU circularly detects the key input of the card holder on the touch screen, judges whether the coordinates of the keys are in the coordinate range of the effective keys, if the keys are invalid, ignores and continues to wait for the next key, and if the keys are effective, obtains the key value corresponding to the key input according to the corresponding relation between the key value and the coordinates;
step S32: the security CPU stores the obtained key values and returns corresponding PIN input events to the application CPU, the events do not contain actual values of the keys and are only used for informing the type of the current key, and the application CPU displays the corresponding PIN input events on a display screen according to the types of the keys;
step S33: if the cardholder finally presses the cancel key or the security CPU detects that the PIN input is overtime, the PIN input is immediately ended, otherwise, the step S34 is executed;
step S34: and if the cardholder finally presses the confirmation key, the safety CPU encrypts the PIN input by the cardholder by using the PIN key according to the PIN input parameter, and returns the encrypted PIN to the application CPU.
Specifically, the key types in step S32 include numeric keys and function keys.
Further, the specific implementation process of step S4 is as follows:
step S41: in the process of detecting PIN input by the security CPU, the application CPU circularly inquires a current PIN input event to perform corresponding interface prompt, if the current event represents that 1 effective number key is pressed, the screen display is increased by one 'to represent PIN input, if the current event represents that a backspace key is pressed, the screen display is decreased by one' and continuously waits, and other events execute step S42;
step S42: if the application CPU obtains any PIN input ending event, the PIN input process is immediately ended, and meanwhile, the safety CPU switches the touch screen control signal back to the application CPU.
Specifically, the end event in step S42 includes a cardholder input cancel key, a PIN input timeout, and a cardholder input confirm key.
Compared with the prior art, the invention has the beneficial effects that:
after the full-touch-screen POS terminal provided by the invention adopts a double-CPU scheme design, the plaintext PIN of a cardholder only appears in a safe CPU with hardware safety characteristics, and the plaintext PIN is immediately encrypted into a ciphertext by the safe CPU after the PIN is input. The intelligent operating system running on the CPU can not directly acquire the plaintext PIN of the cardholder, and only can acquire the ciphertext PIN returned after being encrypted by the safety CPU, so that the risk that the plaintext PIN of the cardholder is stolen when the plaintext PIN of the cardholder appears in the intelligent operating system is prevented, the PIN input safety of the full-touch POS terminal is greatly improved, and the fund safety of the cardholder is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a full touch screen POS terminal PIN input flow of the present invention;
fig. 2 is a virtual keyboard displayed on a display screen during the PIN entry process of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to realize the safe input of the PIN of the full-touch POS terminal, the technical scheme of the invention is that the full-touch POS terminal adopts a double-CPU design and is respectively called as an application CPU and a safe CPU. The two CPUs can control the touch screen, but the application CPU can only obtain common key input, such as the input of transaction amount, and the safety CPU has physical safety characteristic and is responsible for the switching of control signals of the touch screen and the PIN input and encryption. Once entering the PIN entry flow, the secure CPU switches control of the touch screen to itself and then obtains the PIN entered by the cardholder from the touch screen. After PIN input is finished, the safety CPU immediately encrypts the PIN and returns the ciphertext PIN to the application CPU, and finally, the safety CPU switches control of the touch screen to the application CPU. The application CPU runs an intelligent operating system and financial transaction application, and packages the cipher text PIN sent by the security CPU into transaction data and then sends the transaction data to a transaction background.
The technical scheme of the invention is explained below by combining the accompanying drawings:
as shown in fig. 1 and 2, the invention discloses a full-touch-screen POS terminal PIN secure input method, which specifically includes the following steps:
step S1: the terminal comprises double CPUs which are respectively an application CPU and a safety CPU, the application CPU controls the touch screen by default after the terminal is started, and when an application program requires to execute PIN input, the application CPU informs the safety CPU and sends parameters related to the PIN input to the safety CPU;
step S2: the safety CPU receives a PIN input request sent by the application CPU, and immediately switches a touch screen control signal from the application CPU to the safety CPU, wherein only the safety CPU can obtain PIN input on the touch screen in the PIN input process;
step S3: the safety CPU circularly detects and processes PIN input on the touch screen, when the PIN input is finished, the PIN is encrypted by using a PIN secret key preinstalled by the safety CPU, then the ciphertext PIN is returned to the application CPU, and a control signal of the touch screen is switched to the application CPU;
step S4: and the application CPU packs the cipher text PIN acquired from the safety CPU into transaction data and then sends the transaction data to a transaction background, so that one financial transaction is completed.
Further, the specific implementation process of step S1 is as follows:
step S11: designing a layout of a virtual keyboard on a touch screen by an application program, and determining coordinate information of each key for PIN input, wherein the keys of the virtual keyboard at least comprise numeric keys from '0' to '9', and function keys of 'confirm', 'cancel' and 'backspace';
step S12: the application CPU sends a PIN input request, and transmits coordinate information of each key on the virtual keyboard and relevant parameters (PIN key ID, PIN encryption mode, timeout time and the like) of the encrypted PIN to the security CPU.
Further, the specific implementation process of step S2 is as follows:
step S21: the safety CPU receives the PIN input request, judges the validity of all parameters, refuses to execute PIN input if the parameters are invalid, and saves the parameters if the parameters are valid;
step S22: the safety CPU obtains a physical control signal of the touch screen by switching the hardware switch, and the application CPU is ensured not to obtain any touch screen input;
step S23: the safe CPU randomly sorts the number keys from '0' to '9', then corresponds to the coordinate information of the number keys issued by the application program one by one, at the moment, the safe CPU obtains the corresponding relation between the key value of each number key and the coordinate, simultaneously, the safe CPU returns the random number sequence to the application CPU, and the application CPU displays the random number keys on the virtual keyboard.
Further, the specific implementation process of step S3 is as follows:
step S31: the safe CPU circularly detects the key input of the card holder on the touch screen, judges whether the coordinates of the keys are in the coordinate range of the effective keys, if the keys are invalid, ignores and continues to wait for the next key, and if the keys are effective, obtains the key value corresponding to the key input according to the corresponding relation between the key value and the coordinates;
step S32: the safety CPU stores the obtained key value and returns a corresponding PIN input event to the application CPU, the event does not contain the actual value of the key and is only used for informing the type of the current key, the key type comprises a number key and a function key, the application CPU displays the corresponding PIN input event on a display screen according to the key type, for example, when the number key type is received, the screen display is increased by one '+', and when the backspace key is received, the screen display is decreased by one '+';
step S33: if the cardholder finally presses the cancel key or the security CPU detects that the PIN input is overtime, the PIN input is immediately ended, otherwise, the step S34 is executed;
step S34: and if the cardholder finally presses the confirmation key, the safety CPU encrypts the PIN input by the cardholder by using the PIN key according to the PIN input parameter, and returns the encrypted PIN to the application CPU.
Further, the specific implementation process of step S4 is as follows:
step S41: in the process of detecting PIN input by the security CPU, the application CPU circularly inquires a current PIN input event to perform corresponding interface prompt, if the current event represents that 1 effective number key is pressed, the screen display is increased by one 'to represent PIN input, if the current event represents that a backspace key is pressed, the screen display is decreased by one' and continuously waits, and other events execute step S42;
step S42: if the application CPU obtains any one PIN input end event: and if the input of the cardholder cancels the key, the PIN input overtime key and the input of the cardholder confirms the key, the PIN input process is immediately ended, and meanwhile, the safety CPU switches the control signal of the touch screen back to the application CPU.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. A full-touch POS terminal PIN safe input method is characterized by comprising the following steps:
step S1: after the terminal is started, the touch screen is controlled by an application CPU in a default mode, when an application program requires to execute PIN input, the application CPU informs a safety CPU, and parameters related to the PIN input are sent to the safety CPU;
step S2: the safety CPU receives a PIN input request sent by the application CPU, and immediately switches the control signal of the touch screen from the application CPU to the safety CPU;
step S3: the safety CPU circularly detects and processes PIN input on the touch screen, when the PIN input is finished, the PIN is encrypted by using a PIN secret key preinstalled by the safety CPU, then the ciphertext PIN is returned to the application CPU, and a control signal of the touch screen is switched to the application CPU;
step S4: and the application CPU packs the cipher text PIN acquired from the safety CPU into transaction data and then sends the transaction data to a transaction background, so that one financial transaction is completed.
2. The full-touch-screen POS terminal PIN safe input method according to claim 1, wherein the step S1 is implemented as follows:
step S11: the method comprises the steps that an application program designs the layout of a virtual keyboard on a touch screen, and coordinate information of each key for PIN input is determined;
step S12: and the application CPU sends a PIN input request, and transmits the coordinate information of each key on the virtual keyboard and the related parameters of the encrypted PIN to the security CPU.
3. The full-touch-screen POS terminal PIN security input method of claim 2, wherein the keys of the virtual keyboard in the step S11 at least comprise numeric keys from '0' to '9', and function keys of 'confirm', 'cancel' and 'backspace'.
4. The full-touch-screen POS terminal PIN safe input method according to claim 1, wherein the step S2 is implemented as follows:
step S21: the safety CPU receives the PIN input request, judges the validity of all parameters, refuses to execute PIN input if the parameters are invalid, and saves the parameters if the parameters are valid;
step S22: the safety CPU obtains a physical control signal of the touch screen by switching the hardware switch, and the application CPU is ensured not to obtain any touch screen input;
step S23: the safe CPU randomly sorts the number keys from '0' to '9', then corresponds to the coordinate information of the number keys issued by the application program one by one, and simultaneously returns the random number sequence to the application CPU, and the application CPU displays the random number keys on the virtual keyboard.
5. The full-touch-screen POS terminal PIN safe input method according to claim 1, wherein the step S3 is implemented as follows:
step S31: the safe CPU circularly detects the key input of the card holder on the touch screen, judges whether the coordinates of the keys are in the coordinate range of the effective keys, if the keys are invalid, ignores and continues to wait for the next key, and if the keys are effective, obtains the key value corresponding to the key input according to the corresponding relation between the key value and the coordinates;
step S32: the security CPU stores the obtained key values and returns corresponding PIN input events to the application CPU, the events do not contain actual values of the keys and are only used for informing the type of the current key, and the application CPU displays the corresponding PIN input events on a display screen according to the types of the keys;
step S33: if the cardholder finally presses the cancel key or the security CPU detects that the PIN input is overtime, the PIN input is immediately ended, otherwise, the step S34 is executed;
step S34: and if the cardholder finally presses the confirmation key, the safety CPU encrypts the PIN input by the cardholder by using the PIN key according to the PIN input parameter, and returns the encrypted PIN to the application CPU.
6. The full-touch-screen POS terminal PIN security input method of claim 5, wherein the key types in the step S32 comprise a number key and a function key.
7. The full-touch-screen POS terminal PIN safe input method according to claim 1, wherein the step S4 is implemented as follows:
step S41: in the process of detecting PIN input by the security CPU, the application CPU circularly inquires a current PIN input event to perform corresponding interface prompt, if the current event represents that 1 effective number key is pressed, the screen display is increased by one 'to represent PIN input, if the current event represents that a backspace key is pressed, the screen display is decreased by one' and continuously waits, and other events execute step S42;
step S42: if the application CPU obtains any PIN input ending event, the PIN input process is immediately ended, and meanwhile, the safety CPU switches the touch screen control signal back to the application CPU.
8. The full touch screen POS terminal PIN secure entry method of claim 7, wherein the end events in step S42 include a cardholder input cancel key, a PIN input timeout, and a cardholder input confirm key.
CN201911202525.2A 2019-11-29 2019-11-29 Full-touch-screen POS terminal PIN safe input method Pending CN110992047A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911202525.2A CN110992047A (en) 2019-11-29 2019-11-29 Full-touch-screen POS terminal PIN safe input method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911202525.2A CN110992047A (en) 2019-11-29 2019-11-29 Full-touch-screen POS terminal PIN safe input method

Publications (1)

Publication Number Publication Date
CN110992047A true CN110992047A (en) 2020-04-10

Family

ID=70088377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911202525.2A Pending CN110992047A (en) 2019-11-29 2019-11-29 Full-touch-screen POS terminal PIN safe input method

Country Status (1)

Country Link
CN (1) CN110992047A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112446063A (en) * 2020-12-15 2021-03-05 深圳市捷诚技术服务有限公司 Mobile terminal PIN input method, computer storage medium and terminal device
CN114296860A (en) * 2021-12-31 2022-04-08 飞天诚信科技股份有限公司 Method and apparatus for preventing processing of a secure processor from being interrupted

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4656458B1 (en) * 2009-11-09 2011-03-23 Necインフロンティア株式会社 Handy terminal and payment method by handy terminal
CN105957276A (en) * 2016-05-17 2016-09-21 福建新大陆支付技术有限公司 Android system-based intelligent POS security system, starting method and data management control method
CN107888379A (en) * 2017-10-25 2018-04-06 百富计算机技术(深圳)有限公司 A kind of method of secure connection, POS terminal and code keypad
CN107895268A (en) * 2017-11-28 2018-04-10 艾体威尔电子技术(北京)有限公司 A kind of method that safety input PIN is realized on intelligent payment terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4656458B1 (en) * 2009-11-09 2011-03-23 Necインフロンティア株式会社 Handy terminal and payment method by handy terminal
CN105957276A (en) * 2016-05-17 2016-09-21 福建新大陆支付技术有限公司 Android system-based intelligent POS security system, starting method and data management control method
CN107888379A (en) * 2017-10-25 2018-04-06 百富计算机技术(深圳)有限公司 A kind of method of secure connection, POS terminal and code keypad
CN107895268A (en) * 2017-11-28 2018-04-10 艾体威尔电子技术(北京)有限公司 A kind of method that safety input PIN is realized on intelligent payment terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112446063A (en) * 2020-12-15 2021-03-05 深圳市捷诚技术服务有限公司 Mobile terminal PIN input method, computer storage medium and terminal device
CN114296860A (en) * 2021-12-31 2022-04-08 飞天诚信科技股份有限公司 Method and apparatus for preventing processing of a secure processor from being interrupted
CN114296860B (en) * 2021-12-31 2024-04-16 飞天诚信科技股份有限公司 Method and apparatus for preventing disruption of processing by a secure processor

Similar Documents

Publication Publication Date Title
US10609019B2 (en) Establishing a secure channel with a human user
US9547849B2 (en) Method and apparatus for providing real time mutable credit card information and for providing sleep mode functionality
US10229410B2 (en) Method and device for end-user verification of an electronic transaction
AU2017100481A4 (en) Operation of a mobile communication device
US20040024710A1 (en) Secure input pad partition
US20090328168A1 (en) Method for registering and certificating user of one time password by a plurality of mode and computer-readable recording medium where program executing the same method is recorded
AU2013323018B2 (en) Method and system for securely entering identification data in order to authenticate a transaction carried out by means of a self-service terminal
CA2760200A1 (en) Security system and method
CN110992047A (en) Full-touch-screen POS terminal PIN safe input method
US10521793B2 (en) System and method to protect privacy of personal-identification-number entry on consumer mobile device and computing apparatus
EP3195219A1 (en) Point of sale system with secure and unsecure modes
AU2020203182A1 (en) secure data entry and display for a communication device
WO2021088272A1 (en) Application protection method, control device, and readable storage medium
CN112669021B (en) Digital currency hardware wallet based on mobile terminal
WO2008032916A1 (en) Method for registering and certificating user of one time password by a plurality of mode and computer-readable recording medium where program executing the same method is recorded
KR100835260B1 (en) Internet-banking controll method
CN108540652B (en) Secure interaction method and device
CN109298910B (en) Window calling method, mobile terminal and computer readable storage medium
CN107705111A (en) Electric paying method and device
KR101016829B1 (en) Auto Teller Machine and Method for Financial Transaction thereof
CN105554010A (en) Password encryption method and system and intelligent terminal
KR102272022B1 (en) User certification method and apparatus performing the same
WO2018126283A1 (en) Real time pin management
WO2013186247A1 (en) System and method for validating a user of an account using a token
CN108985767A (en) PIN data safe input method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200410

RJ01 Rejection of invention patent application after publication